I work for a municipal government, using mostly Windows servers. In recent days several similar governments in our geographic area have been attacked, some successfully, by ransomware. So our security ...

I have an iMac on the same network as my Windows desktop. Both are on the local network at my university.
I am sharing a folder on the iMac using the built-in sharing utility (via SMB) with everyone ...

I know how Responder works but I am a little bit confused regarding the attack.
Responder runs on attacker's machine and waits for someone to type something wrong in Windows Explorer. For ex: instead ...

Assume the following:
An attacker has access to a remote Windows share on a remote host.
Attacker manages to bruteforce a local Windows account on the host and can login to it via SMB.
Attacker can ...

I noticed that my SMB shares from a Samba server no longer appeared in Windows 10 network browsing (network neighborhood) in Windows file explorer. The reason turned out to be that this functionality ...

I don't have much experience in protecting windows machines, so sorry if I'm missing something obvious; how would one protect from psexec without disabling SMB? One could disable the admin$ share, but ...

I have a NAS (network disk) from Zylex which stopped working under Windows 10 a while ago. Investigation shows that it uses SMBv1, which was implicated in several ransomware attacks and was therefore ...

I am trying to complete a CTF and am presented with a machine that has several SMB shares, as found using metasploit auxiliary/scanner/smb/smb_enumshares.
- Windows XP Service Pack 3 (English)
- IPC$ ...

I have set up my ethical hacking and penetration lab. My host OS is Windows 10 and target 0S is Windows 7. I want to penetrate into Windows 7 from Windows 10 through SMB.
When I try to penetrate, it ...

Is it possible to execute an SMBRelay attack that mounts a share instead of execute code? The application I am testing uses a non-administrative user but has access to several SMB shares. Only NTLMv2 ...

Using Responder to capture NTLMv2 hashes on LAN using kali and relay them to the smbrelayx.py module from Impacket.
I understand I have to change the config file in Responder to set the SMB and HTTP ...

WannaCrypt-like SMB spreading technique was widely used in Stuxnet, as docummented by Symantec and Kaspersky.
Read this: W32.Stuxnet Dossier (2010,Symantec PDF)
Now we have the name of the exploit: ...

I have a network with several servers and I've disabled SMBv1 on every server except one because an office printer/scanner is used to scan documents to a shared folder over SMB. The printer is only ...

SMB is a well-known network file sharing protocol, and I assume it's supposed to be used internally only. At my company I found someone connecting to a share on a server on the Internet over port 445 ...

I have a (test) setup where I want to respond to NBNS broadcasts. The clients sending out the broadcasts are on a different network. I can sniff the traffic using a pivot host on this network. So far ...

SMB signing is used to prevent illegitimate modification on SMB packets. It is also used to prevent attacks like SMB relay.
There is not much documentation on SMB signing. The only thing I understand ...

The Responder tool can grab the netntlm hashes of clients on a Microsoft AD network by either using LLMNR to answer queries "accidentally" made by clients by responding as otherwise nonexistent SMB ...

So, doing some testing after seeing a Responder tweet where SMBv2 is supported (https://twitter.com/PythonResponder/status/774236707847704576) and testing a scenario with Windows 7 SMB lookup for an ...